Course Unit Code | 460-4046/03 |
---|
Number of ECTS Credits Allocated | 4 ECTS credits |
---|
Type of Course Unit * | Optional |
---|
Level of Course Unit * | Second Cycle |
---|
Year of Study * | |
---|
Semester when the Course Unit is delivered | Summer Semester |
---|
Mode of Delivery | Face-to-face |
---|
Language of Instruction | English |
---|
Prerequisites and Co-Requisites | Course succeeds to compulsory courses of previous semester |
---|
Name of Lecturer(s) | Personal ID | Name |
---|
| OH140 | RNDr. Eliška Ochodková, Ph.D. |
Summary |
---|
This subject provides an explanation of basic contents of IT security. It focuses on the symetric and public-key cryptography, cryptographic hash functions, authentication protocols, digital signatures and certificates. Course contains a survey of standards and covers legislative aspects of IT security. |
Learning Outcomes of the Course Unit |
---|
After graduation student will be able to:
1. Classify various kinds of attacks.
2. Classify particular security goals and security mechanisms dedicated to gain them.
3. Categorize cryptographic mechanisms.
4. Formulate mathematical background of cryptographic algorithms.
5. Design security mechanisms.
6. Demonstrate practical usage of cryptographic mechanisms and applied them.
7. Cooperate on project. |
Course Contents |
---|
Lectures:
• Introduction to information and data security. Basic concepts: attacks, risks, security functions and mechanisms, vulnerabilities.
• Introduction to number theory.
• Cryptography: basic concepts, cryptanalytic attacks.
• Cryptography: classical techniques and its cryptanalysis.
• Cryptography: symetric algorithms, basic concepts and principles, block cipher modes of operation, DES, AES.
• Cryptography: aymetric algorithms (public-key cryptography), basic concepts and principles. RSA, ELGamal.
• Key management. Key exchange, Diffie-Hellman.
• Authentication, authentication protocols, biometry.
• Hash function, MAC.
• Digital signature, DSS. Certificates, certificate authority.
• Eliptic curve cryptography.
• Firewalls, electronic mail security (PEM, PGP, S/MIME), SSL.
• Standards (ITSEC, ITSEM, Common Criteria, ISO 9000,...) and legislative aspects of IT security.
Computer laboratories
• Practice the mathematical principles of the algorithms discussed.
• Modular arithmetic.
• Algebraic structures.
• Number theory.
• Historical cryptography.
• Symmetric cryptography.
• Asymmetric cryptography.
• Hashing functions.
• Practical examples of security applications and protocols I.
• Practical demonstrations of security applications and protocols II.
• Practical demonstrations of security applications and protocols III. |
Recommended or Required Reading |
---|
Required Reading: |
---|
[1] Ochodková E., Matematické základy kryptografických algoritmů, http://mi21.vsb.cz/modul/matematicke-zaklady-kryptografickych-algoritmu
[2] Stallings, W.: Cryptography and Network Security, Prentice Hall, 1999 a pozdější
[3] Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone: Handbook of Applied Cryptography, CRC Press, ISBN: 0-8493-8523-7, October 1996, 816 pages, http://www.cacr.math.uwaterloo.ca/hac/
|
[1] Ochodková E., Matematické základy kryptografických algoritmů, http://mi21.vsb.cz/modul/matematicke-zaklady-kryptografickych-algoritmu
[2] Stallings, W.: Cryptography and Network Security, Prentice Hall, 1999 a pozdější
[3] Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone: Handbook of Applied Cryptography, CRC Press, ISBN: 0-8493-8523-7, October 1996, 816 pages, http://www.cacr.math.uwaterloo.ca/hac/
|
Recommended Reading: |
---|
[1] Schneier B.: Applied cryptography, John Wiley & Sons, New York, 1995 (2nd edition)
[2] Pfleeger Ch.P.: Security in Computing, Prentice Hall, 1997 a pozdější
[3] Gollmann D.: Computer Security , Wiley 2000 |
[1] Schneier B.: Applied cryptography, John Wiley & Sons, New York, 1995 (2nd edition)
[2] Pfleeger Ch.P.: Security in Computing, Prentice Hall, 1997 a pozdější
[3] Gollmann D.: Computer Security , Wiley 2000 |
Planned learning activities and teaching methods |
---|
Lectures, Tutorials |
Assesment methods and criteria |
---|
Tasks are not Defined |